Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.
Imagine a cyber-attack that disables an electricity distribution center. What's the role of the U.S. military, government or the utility company in defending and retaliating? That's a question on the mind of Army Col. Gregory Conti.
Paul Smocer of BITS explains why banking institutions, which face increasing cyberthreats, need to put the NIST Cybersecurity Framework to use, and why third parties should prepare for more regulatory scrutiny of their security practices.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Banking institutions need to develop "day-to-day situational awareness" of the latest threats, says Vikram Bhat, a principal at Deloitte & Touche, which just released a report about cybersecurity issues and awareness.
The folks at PricewaterhouseCoopers, after surveying 500 U.S. business, law enforcement and government executives, conclude that the vast majority of cybersecurity programs fall very short of the federal government's cybersecurity framework goals....
High-profile retail breaches, such as the one suffered by Target Corp., could spur more merchants to promote increased use of mobile payments to boost security, says Thad Peterson, a new analyst at Aite Group....
What does "IT security as a business enabler" mean? For a definition, Gartner's Paul Proctor looks to the way IT managers at a European car maker translate security problems into a language a CEO can understand.
The Federal Reserve will make recommendations this summer for how the United States could launch a "fast-payments" system with enhanced authentication, says Kirstin Wells of the Federal Reserve Bank of Chicago.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Consumers around the world aren't overly concerned about Internet security, perhaps because they've experienced fatigue from the oversaturated media coverage of data breaches, Unisys Chief Information Security Officer David Frymier says.
As mobile banking adoption rapidly grows this year, financial institutions need to identify and fill security gaps, says Aite Group analyst Julie Conroy, a featured speaker at the May 14 Fraud Summit Chicago.